SlideShare a Scribd company logo
1 of 35
Security Issues, Ethics, and Emerging Technologies in Education Chapter 8
Computer Security: Risks and Safeguards Computer security risk -  Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability Any illegal act involving a computer generally is referred to as a computer crime Computer Viruses New virus programs found every day Boot sector virus File virus Worm Trojan horse Macro virus Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4
Computer Security: Risks and Safeguards Virus Detection and Removal Antivirus programs Popular antivirus programs Many options to using antivirus software Rescue disk Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 5
Computer Security: Risks and Safeguards Possessed Objects and Biometric Devices A possessed object is any item that you must carry to gain access to a computer Badges, cards, smart cards, and keys Personal Identification Number (PIN) Biometric devices authenticate a person’s identity with a physical characteristic Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 6
Computer Security: Risks and Safeguards Firewall A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network Proxy server Personal firewall Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 7
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8
Computer Security: Risks and Safeguards Hardware Theft and Vandalism Cable lock devices Portable equipment warrants special considerations Computer vandalism Cutting cables Deleting software Smashing computer Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 9
Ethics and the Information Age Computer ethics Moral guidelines that govern the use of computers, networks, and information systems Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 10
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11
Ethics and the Information Age Information Privacy The right of individuals and organizations to deny or restrict the collection and use of information about them Unauthorized collection and use of information Electronic profiles Federal and state laws Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13
Ethics and the Information Age Phishing Email attempting to obtain personal and financial information Spam An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once Average user receives more than 1,000 spam e-mail messages each year Anti-spam campaigns Anti-spam program Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14
Ethics and the Information Age Employee and Student Monitoring Use of computers to observe, record, view, and review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP) Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15
Ethics and the Information Age Copyright Laws Copyright Act of 1976 Illegal copying Fair use Copyright information on Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 16
Ethics and the Information Age Copyright Laws Teacher and student Web pages Copyright laws do protect these pages Public domain Web sites CDs and DVDs with images, graphics, audio, and video clips Guidelines for creating Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18
Internet Ethics and Objectionable Materials Three categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material Inaccurate information Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19
Internet Ethics and Objectionable Materials Recent Government Actions Children’s Internet Protection Act Protects children from obscene, pornographic, and other information considered to be harmful to minors Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 20
Internet Ethics and Objectionable Materials Parental Controls Rating systems ICRA Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21
Internet Ethics and Objectionable Materials Parental Controls Filtering software programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 22
Internet Ethics and Objectionable Materials Parental Controls Filtering software Check Internet browser’s history Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 23
Internet Ethics and Objectionable Materials Educational Controls Curriculum pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24
Internet Ethics and Objectionable Materials Educational Controls Teacher observation Final measure to prevent students from accessing objectionable and inappropriate materials Instruct students on use of Back button on the browser Understanding of ethical concepts Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25
Health Issues Computers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS) Hand Exercises Computer Vision Syndrome (CVS) Techniques to ease eyestrain Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26
Health Issues Ergonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27
Emerging Technologies The World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 28
Emerging Technologies Assistive Technologies Technologies that modify or adapt the classroom for special learning needs Individuals with Disabilities Act (IDEA) Amendment of 1997 Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 29
Emerging Technologies Web- and Video-Enhanced Digital Textbooks Web site is continuously updated and maintained Web-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all schools Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 30
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31
Emerging Technologies Wireless Technologies Allows teachers and students to connect to a truly global network Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32
Syllabus Changes NO CLASS AUGUST 3rd Final = July 29th July 20th, 22nd =work on presentation July 27th= Presentations July 29th last class=final Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 33
Multimedia Presentations- Find  partner Begin brainstorming and planning presentation based on chapter assigned to you. http://may2010edtech.pbworks.com/Multimedia-Presentations Chapter 7: Evaluating Educational Technology and Integration Strategies 34
Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35

More Related Content

What's hot

The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Educationmwolfrey
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'JISC RSC Eastern
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptarhodes
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationJisc
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service patricia franklin
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 
Insight into Managing mobile devices webinar
Insight into Managing mobile devices webinarInsight into Managing mobile devices webinar
Insight into Managing mobile devices webinarJisc RSC East Midlands
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyJulie Evans
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance InformationTũi Wichets
 
Parent presentation website
Parent presentation websiteParent presentation website
Parent presentation websitepearland_tech
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issuesrgermosen
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Digital Life Class 1 - 1:1 Agreement
Digital Life Class 1 - 1:1 AgreementDigital Life Class 1 - 1:1 Agreement
Digital Life Class 1 - 1:1 AgreementMister Norris
 

What's hot (20)

The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and education
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Insight into Managing mobile devices webinar
Insight into Managing mobile devices webinarInsight into Managing mobile devices webinar
Insight into Managing mobile devices webinar
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
Information Security in Schools - Recommended Practice (January 2019)
Information Security in Schools - Recommended Practice (January 2019)Information Security in Schools - Recommended Practice (January 2019)
Information Security in Schools - Recommended Practice (January 2019)
 
Parent presentation website
Parent presentation websiteParent presentation website
Parent presentation website
 
document
documentdocument
document
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issues
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Digital Life Class 1 - 1:1 Agreement
Digital Life Class 1 - 1:1 AgreementDigital Life Class 1 - 1:1 Agreement
Digital Life Class 1 - 1:1 Agreement
 

Viewers also liked

Microsoft Power Point Information Security And Risk Managementv2
Microsoft Power Point   Information Security And Risk Managementv2Microsoft Power Point   Information Security And Risk Managementv2
Microsoft Power Point Information Security And Risk Managementv2Graeme Payne
 
Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Karlos Svoboda
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsJeremy Flores
 
Security and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab PatelSecurity and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab PatelInqilab Patel
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 

Viewers also liked (9)

Microsoft Power Point Information Security And Risk Managementv2
Microsoft Power Point   Information Security And Risk Managementv2Microsoft Power Point   Information Security And Risk Managementv2
Microsoft Power Point Information Security And Risk Managementv2
 
Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28
 
COMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and EthicsCOMPED9 Module 5 Security and Ethics
COMPED9 Module 5 Security and Ethics
 
Emerging technology in cyber security
Emerging technology in cyber securityEmerging technology in cyber security
Emerging technology in cyber security
 
Security and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab PatelSecurity and ethics ffor O Level by Inqilab Patel
Security and ethics ffor O Level by Inqilab Patel
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 

Similar to Ch.8[1]

Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessCasey Robertson
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Ansgar Koene
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce SecurityMrUmairKhan1
 
CH11security-Cybersecurity and Firewall.ppt
CH11security-Cybersecurity and Firewall.pptCH11security-Cybersecurity and Firewall.ppt
CH11security-Cybersecurity and Firewall.pptHaroldQuizon2
 

Similar to Ch.8[1] (20)

ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Newethics
NewethicsNewethics
Newethics
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming Process
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Synopsis
SynopsisSynopsis
Synopsis
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
CH11security-Cybersecurity and Firewall.ppt
CH11security-Cybersecurity and Firewall.pptCH11security-Cybersecurity and Firewall.ppt
CH11security-Cybersecurity and Firewall.ppt
 

More from Leslee

Ch 1 and 2
Ch 1 and  2Ch 1 and  2
Ch 1 and 2Leslee
 
Ch 1 and 2
Ch 1 and  2Ch 1 and  2
Ch 1 and 2Leslee
 
Ch 1 and 2
Ch 1 and  2Ch 1 and  2
Ch 1 and 2Leslee
 
Chapter 4
Chapter 4Chapter 4
Chapter 4Leslee
 
Welcome eme2040[1]
Welcome eme2040[1]Welcome eme2040[1]
Welcome eme2040[1]Leslee
 
Eme2040 summer b syllabus
Eme2040 summer b syllabusEme2040 summer b syllabus
Eme2040 summer b syllabusLeslee
 
Edtechsummer b syllabus
Edtechsummer b syllabusEdtechsummer b syllabus
Edtechsummer b syllabusLeslee
 
Welcome![1]
Welcome![1]Welcome![1]
Welcome![1]Leslee
 

More from Leslee (9)

Ch 1 and 2
Ch 1 and  2Ch 1 and  2
Ch 1 and 2
 
Ch 1 and 2
Ch 1 and  2Ch 1 and  2
Ch 1 and 2
 
Ch 1 and 2
Ch 1 and  2Ch 1 and  2
Ch 1 and 2
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Welcome eme2040[1]
Welcome eme2040[1]Welcome eme2040[1]
Welcome eme2040[1]
 
Eme2040 summer b syllabus
Eme2040 summer b syllabusEme2040 summer b syllabus
Eme2040 summer b syllabus
 
Edtechsummer b syllabus
Edtechsummer b syllabusEdtechsummer b syllabus
Edtechsummer b syllabus
 
Welcome![1]
Welcome![1]Welcome![1]
Welcome![1]
 
Ch 5
Ch 5Ch 5
Ch 5
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Ch.8[1]

  • 1. Security Issues, Ethics, and Emerging Technologies in Education Chapter 8
  • 2. Computer Security: Risks and Safeguards Computer security risk - Any event or action that has the potential of causing a loss of computer equipment, software, data and information, or processing capability Any illegal act involving a computer generally is referred to as a computer crime Computer Viruses New virus programs found every day Boot sector virus File virus Worm Trojan horse Macro virus Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 2
  • 3. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 3
  • 4. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 4
  • 5. Computer Security: Risks and Safeguards Virus Detection and Removal Antivirus programs Popular antivirus programs Many options to using antivirus software Rescue disk Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 5
  • 6. Computer Security: Risks and Safeguards Possessed Objects and Biometric Devices A possessed object is any item that you must carry to gain access to a computer Badges, cards, smart cards, and keys Personal Identification Number (PIN) Biometric devices authenticate a person’s identity with a physical characteristic Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 6
  • 7. Computer Security: Risks and Safeguards Firewall A security system consisting of hardware and/or software that prevents unauthorized access to data and information on a network Proxy server Personal firewall Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 7
  • 8. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 8
  • 9. Computer Security: Risks and Safeguards Hardware Theft and Vandalism Cable lock devices Portable equipment warrants special considerations Computer vandalism Cutting cables Deleting software Smashing computer Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 9
  • 10. Ethics and the Information Age Computer ethics Moral guidelines that govern the use of computers, networks, and information systems Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 10
  • 11. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 11
  • 12. Ethics and the Information Age Information Privacy The right of individuals and organizations to deny or restrict the collection and use of information about them Unauthorized collection and use of information Electronic profiles Federal and state laws Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 12
  • 13. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 13
  • 14. Ethics and the Information Age Phishing Email attempting to obtain personal and financial information Spam An unsolicited e-mail mess or newsgroup posting sent to many recipients or newsgroups at once Average user receives more than 1,000 spam e-mail messages each year Anti-spam campaigns Anti-spam program Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 14
  • 15. Ethics and the Information Age Employee and Student Monitoring Use of computers to observe, record, view, and review an individual’s use of a computer Policies of computer use Acceptable Use Policy (AUP) Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 15
  • 16. Ethics and the Information Age Copyright Laws Copyright Act of 1976 Illegal copying Fair use Copyright information on Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 16
  • 17. Ethics and the Information Age Copyright Laws Teacher and student Web pages Copyright laws do protect these pages Public domain Web sites CDs and DVDs with images, graphics, audio, and video clips Guidelines for creating Web pages Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 17
  • 18. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 18
  • 19. Internet Ethics and Objectionable Materials Three categories of objectionable material Pornographic material Racist literature, gambling Incorrect or inappropriate material Inaccurate information Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 19
  • 20. Internet Ethics and Objectionable Materials Recent Government Actions Children’s Internet Protection Act Protects children from obscene, pornographic, and other information considered to be harmful to minors Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 20
  • 21. Internet Ethics and Objectionable Materials Parental Controls Rating systems ICRA Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 21
  • 22. Internet Ethics and Objectionable Materials Parental Controls Filtering software programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 22
  • 23. Internet Ethics and Objectionable Materials Parental Controls Filtering software Check Internet browser’s history Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 23
  • 24. Internet Ethics and Objectionable Materials Educational Controls Curriculum pages Acts as guides for students Sites are pre-evaluated by teachers Eliminates typing mistakes when typing URLs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 24
  • 25. Internet Ethics and Objectionable Materials Educational Controls Teacher observation Final measure to prevent students from accessing objectionable and inappropriate materials Instruct students on use of Back button on the browser Understanding of ethical concepts Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 25
  • 26. Health Issues Computers and Health Issues Musculoskeletal Disorder (MSD) Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome (CTS) Hand Exercises Computer Vision Syndrome (CVS) Techniques to ease eyestrain Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 26
  • 27. Health Issues Ergonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 27
  • 28. Emerging Technologies The World Wide Web Most K-12 schools are on the Internet The federal government is committed to high-speed Internet access in every classroom Speed will increase Full-motion video on demand Instant access to Web-based educational programs Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 28
  • 29. Emerging Technologies Assistive Technologies Technologies that modify or adapt the classroom for special learning needs Individuals with Disabilities Act (IDEA) Amendment of 1997 Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 29
  • 30. Emerging Technologies Web- and Video-Enhanced Digital Textbooks Web site is continuously updated and maintained Web-Based Distance Learning All instruction provided via the Web Still evolving Useful for specialized classes not available in all schools Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 30
  • 31. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 31
  • 32. Emerging Technologies Wireless Technologies Allows teachers and students to connect to a truly global network Wireless computers will ensure that educational technology is used seamlessly and at the point of instruction Small, inexpensive computers ensure that all children have access to their lessons and the World from both home and school Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 32
  • 33. Syllabus Changes NO CLASS AUGUST 3rd Final = July 29th July 20th, 22nd =work on presentation July 27th= Presentations July 29th last class=final Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 33
  • 34. Multimedia Presentations- Find partner Begin brainstorming and planning presentation based on chapter assigned to you. http://may2010edtech.pbworks.com/Multimedia-Presentations Chapter 7: Evaluating Educational Technology and Integration Strategies 34
  • 35. Chapter 8: Security Issues, Ethics, and Emerging Technologies in Education 35